Discussion about this post

User's avatar
Taimur Ijlal's avatar

Nice primer ! it boggles my mind how often data classification gets overlooked for the more sexier parts of cybersecurity. It pretty much forms the basis for effective access control

Expand full comment
Chad Miars's avatar

Thank you for sharing this scheme. It makes sense to me.

Expand full comment
1 more comment...

No posts